Common Information
Type Value
Value
Cloud Accounts - T1586.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Compromising cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) A variety of methods exist for compromising cloud accounts, such as gathering credentials via [Phishing for Information](https://attack.mitre.org/techniques/T1598), purchasing credentials from third-party sites, conducting [Password Spraying](https://attack.mitre.org/techniques/T1110/003) attacks, or attempting to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s.(Citation: MSTIC Nobelium Oct 2021) Prior to compromising cloud accounts, adversaries may conduct Reconnaissance to inform decisions about which accounts to compromise to further their operation. In some cases, adversaries may target privileged service provider accounts with the intent of leveraging a [Trusted Relationship](https://attack.mitre.org/techniques/T1199) between service providers and their customers.(Citation: MSTIC Nobelium Oct 2021)
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 24 Major cyber attacks and data breaches of 2024
Details Website 2024-11-13 3 Top challenges for implementing multi-domain correlation in the cloud
Details Website 2024-11-13 1 Top challenges for implementing multi-domain correlation in the cloud
Details Website 2024-11-12 4 Hunting for Account Takeovers in Office 365 Logs
Details Website 2024-11-12 0 Cloud Data Security: How to Get it Right?
Details Website 2024-11-12 0 The Problem: Using One Email for Everything
Details Website 2024-11-12 5 Report Shows Ransomware Has Grown 41% for Construction Industry - ReliaQuest
Details Website 2024-11-12 0 Elastic Security 8.16: Elastic AI Assistant updates and contextualized cloud detection and response
Details Website 2024-11-08 0 Google To Make MFA Mandatory for Google Cloud in 2025
Details Website 2024-11-07 1 Google Cloud to make MFA mandatory by the end of 2025
Details Website 2024-11-07 0 Google Cloud makes MFA mandatory for all global users by 2025 - Cybersecurity Insiders
Details Website 2024-11-07 2 Runtime security in multi-cloud environments: best practices and importance
Details Website 2024-11-07 0 Mandatory Multifactor Authentication for Google Cloud Users by 2025 - RedPacket Security
Details Website 2024-11-07 1 Google’s New Security Mandate: MFA to be Mandatory on All Google Cloud Accounts by 2025
Details Website 2024-11-07 6 Category
Details Website 2024-11-06 0 Google Cloud: MFA Will Be Mandatory for All Users in 2025
Details Website 2024-11-06 0 GZR Observer Daily — Nov 6, 2024
Details Website 2024-11-06 0 CloudCheckr Unveiled: Comprehensive Guide to Cloud Cost Management, Security, and Compliance…
Details Website 2024-11-06 0 Google Cloud to Mandate Multifactor Authentication by 2025
Details Website 2024-11-06 1 Google Cloud to make MFA mandatory by the end of 2025
Details Website 2024-11-05 5 Mastering Cloud Security Audit: Step-by-Step with Scout Suite
Details Website 2024-11-05 4 The Credential Abuse Cycle: Theft, Trade, and Exploitation - ReliaQuest
Details Website 2024-10-31 2 The Latest in Cybersecurity: Recent Vulnerabilities and Breaches to Watch
Details Website 2024-10-31 4 Moving Baselime from AWS to Cloudflare: simpler architecture, improved performance, over 80% lower cloud costs